Claude-skill-registry codex-sandbox-preflight
Use at the start of a Codex session (especially sandboxed) to run `scripts/codex-sandbox-preflight.sh` and interpret network + writable_roots constraints.
install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/codex-sandbox-preflight" ~/.claude/skills/majiayu000-claude-skill-registry-codex-sandbox-preflight && rm -rf "$T"
manifest:
skills/data/codex-sandbox-preflight/SKILL.mdsource content
Codex sandbox preflight
When to use
- Start of a new Codex session (default).
- You see sandbox-ish errors like
,PermissionError: [Errno 1] Operation not permitted
, or unexpected “Permission denied” when paths look writable.seccomp - You need to know if network is disabled in the tool sandbox before attempting auth, installs,
, etc.git push
Workflow
- Run the preflight helper:
scripts/codex-sandbox-preflight.sh
- If you’re in a normal shell and want to see what happens when network is enabled inside the sandbox:
scripts/codex-sandbox-preflight.sh --with-network
- Summarize results (don’t paste the full output unless asked):
- Tool sandbox network:
allowed vs blocked (and DNS if allowed).socket() - Writable roots: whether
is writable inside the sandbox.~/.config/wbg-auth - Config drift: whether
is symlinked to dotfiles or has diverged.~/.codex/config.toml
Interpretation cheatsheet
:INFO- socket() syscall blocked- Tool sandbox has network disabled (expected in many sandboxed sessions).
- Avoid network-dependent commands/tools inside the sandbox.
- To allow sandbox network, start Codex with
(still sandboxed, but with egress).-c sandbox_workspace_write.network_access=true
(or similar) / sandbox write fails forWARN missing_writable_root=$HOME/.config/wbg-auth
:~/.config/wbg-auth
will crash on startup due to log file creation.wbg-auth- Fix by adding
to~/.config/wbg-auth
insandbox_workspace_write.writable_roots
.~/.codex/config.toml
Notes / pitfalls
- Running this from inside an already-restricted tool sandbox cannot “prove” that enabling network would work; outer seccomp will still block
. Usesocket()
from a normal shell for that.--with-network - This helper must never print secrets; it only checks tool presence, config linkage, writability, and basic DNS.